Defend against threats with Microsoft 365
- Offered byMicrosoft
Defend against threats with Microsoft 365 at Microsoft Overview
Duration | 4 hours |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Defend against threats with Microsoft 365 at Microsoft Highlights
- Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender
- Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender
Defend against threats with Microsoft 365 at Microsoft Course details
- Introduction to threat protection with Microsoft 365
- Remediate risks with Microsoft Defender for Office 365
- Protect against threats with Microsoft Defender for Endpoint
- Safeguard your environment with Microsoft Defender for Identity
- Microsoft 365 includes security technologies that enterprises can use to secure email, data, devices, and identities against the risk of cyber threats
- This learning path provides an introduction to Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365
- Learn about cybersecurity threats and how the new threat protection tools from Microsoft protect your organization's users, devices, and data
Defend against threats with Microsoft 365 at Microsoft Curriculum
MODULE: 1 Introduction to threat protection with Microsoft 365
Introduction to threat protection
Learn about common threats
Understand the evolving threat landscape
MODULE: 2 Protect against threats with Microsoft Defender for Endpoint
Introduction to Microsoft Defender for Endpoint
Practice security administration
Hunt threats within your network
MODULE: 3 Remediate risks with Microsoft Defender for Office 365
Introduction to Microsoft Defender for Office 365
Automate, investigate, and remediate
Configure, protect, and detect
Simulate attacks
MODULE: 4 Safeguard your environment with Microsoft Defender for Identity
Introduction to Microsoft Defender for Identity
Configure Microsoft Defender for Identity sensors
Review compromised accounts or data
Integrate with other Microsoft tools